首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   37篇
  免费   5篇
  国内免费   2篇
  2022年   1篇
  2021年   3篇
  2020年   5篇
  2019年   1篇
  2018年   1篇
  2017年   1篇
  2016年   2篇
  2015年   1篇
  2014年   2篇
  2013年   15篇
  2012年   1篇
  2005年   1篇
  2004年   3篇
  2003年   1篇
  2000年   1篇
  1999年   3篇
  1998年   2篇
排序方式: 共有44条查询结果,搜索用时 31 毫秒
1.
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations.  相似文献   
2.
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability.  相似文献   
3.
导弹系统电磁兼容预测初探   总被引:1,自引:0,他引:1  
基于"电磁拓扑"和"电磁屏障"概念,应用"电磁拓扑-图论混合技术"详细阐述了导弹系统的电磁拓扑描述及电磁干扰相互作用关联图,并分析了针对导弹武器系统应用电磁拓扑图论法的基本步骤。  相似文献   
4.
在频率为1010以下的情况下,给出了由正弦交变电流引起的二维时变电磁场所对应的偏微分方程,并用非线性算子半群理论及单调算子理论证明了相应偏微分方程第一边值初值问题广义解的存在与唯一性.  相似文献   
5.
采用CS01测试法对导弹武器系统的电子设备进行电源线传导敏感度测试,由于测试指标和测试方法的限定要求,将不仅影响受试电子设备的正常工作,而且还会对CS01设备本身产生不利影响。在分析产生上述影响原因的同时,有针对性地提出了有效的解决措施,使由于限定要求带来的不利影响降低到最低限度,以使导弹电子设备电源线传导敏感度测试能按国军标规定要求正常进行。  相似文献   
6.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.  相似文献   
7.
介绍了存储示波器在核爆炸电磁脉冲测量中的应用,给出了系统框图,用计算机作FFT运算,实现频谱分析.  相似文献   
8.
The use of a shaped liner driven by electromagnetic force is a new means of forming jets. To study the mechanism of jet formation driven by electromagnetic force, we considered the current skin effect and the characteristics of electromagnetic loading and established a coupling model of"Electric—Magnetic—Force"and the theoretical model of jet formation under electromagnetic force. The jet formation and penetration of conical and trumpet liners have been calculated. Then, a numerical simulation of liner collapse under electromagnetic force, jet generation, and the stretching motion were performed using an ANSYS multiphysics processor. The calculated jet velocity, jet shape, and depth of penetration were consistent with the experimental results, with a relative error of less than 10%. In addition, we calculated the jet formation of different curvature trumpet liners driven by the same loading condition and ob-tained the influence rule of the curvature of the liner on jet formation. Results show that the theoretical model and the ANSYS multiphysics numerical method can effectively calculate the jet formation of liners driven by electromagnetic force, and in a certain range, the greater the curvature of the liner is, the greater the jet velocity is.  相似文献   
9.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
10.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号